The attacks from cybercriminals are now occurring in the online stock and equity trading world. Instead of simply emptying out compromised brokerage...
Microsoft Hotmail has a new feature: Out of Band Authentication via cell phone SMS Text. They call it ‘single-use codes’: Single-use codes...
I was greeted with the most charming email this morning. A young lady is so impressed with me that she wants to...
I received the following email recently: Greetings, Please forgive me for the unofficial way of reaching you via email Contacting you is...
Reports that Starbucks (NASD: SBUX) will be offering free 802.11 wireless access at all US locations starting July 1st raised some speculative...
The fifth IEEE eCrime Researchers Summit 2010 once again will be held in conjunction with the 2010 APWG General Meeting between October...
Ouch. This affects virtually everyone including Mac, Linux, and Windows users. More can be found here at the PSIRT site. And yes,...
A spyware application Intego calls OSX/OpinionSpy is being spread as part of the installation process for a number of screensavers and other...
Blippy recently had a small data breach which merely underscored the risks of a growing segment of social networks which showcases your...
In the survey, banks that were notifying consumers as quickly as possible or immediately across multiple channels performed well [and] they also...
Mashable reports a halt to the insanity over privacy may be only a day away… On Sunday, Facebook CEO Mark Zuckerberg promised...
I’m not always in alignment with Jeffrey Carr’s point of view but in this he is spot on. Succinct and to the...
Since the feed will be public and historic, there is a potential to research trends over the timeline, particularly as twitter is...
Brian Krebs, source of a lot of key research on the banking trojan focus on small to medium sized business, has reported...
What would happen if every single one of the four BILLION cell phones on this planet just went dark? Or most likely,...
Forbes contributor Richard Stennion doesn’t like the Cybersecurity Act of 2010 very much. We know it around here as S. 773 and...
During a recent illness I was doing some research into rendition and the Fourth Amendment evidentiary issues which may come up more...
At least it’s easier to understand than the prompt from Facebook asking me to accept and open my connections which I saw...
David Harley sent me a link to an article about a scam I wasn’t familiar with. I wouldn’t really call it a...
While the jury’s still out about whether the intent of the past month’s mass webserver breaches are fully criminal, Dancho reports new...
Are Your SaaS Backups as Secure as Your Production Data?
MS Exchange Server Flaws Exploited to Deploy Keylogger in Targeted Attacks
SolarMarker Malware Evolves to Resist Takedown Attempts with Multi-Tiered Infrastructure
“Linguistic Lumberjack” Vulnerability Discovered in Popular Logging Utility Fluent Bit
Foxit PDF Reader Flaw Exploited by Hackers to Deliver Diverse Malware Arsenal
Defending Your Commits From Known CVEs With GitGuardian SCA And Git Hooks
Cyber Criminals Exploit GitHub and FileZilla to Deliver Malware Cocktail
Latrodectus Malware Loader Emerges as IcedID’s Successor in Phishing Campaigns
Grandoreiro Banking Trojan Resurfaces, Targeting Over 1,500 Banks Worldwide
Kinsing Hacker Group Exploits More Flaws to Expand Botnet for Cryptojacking
China-Linked Hackers Adopt Two-Stage Infection Tactic to Deploy Deuterbear RAT
Kimsuky APT Deploying Linux Backdoor Gomir in South Korean Cyber Attacks
How to implement Principle of Least Privilege(Cloud Security) in AWS, Azure, and GCP cloud
New Wi-Fi Vulnerability Enables Network Eavesdropping via Downgrade Attacks
North Korean Hackers Exploit Facebook Messenger in Targeted Malware Campaign
Cybercriminals Exploiting Microsoft’s Quick Assist Feature in Ransomware Attacks
Google Patches Yet Another Actively Exploited Chrome Zero-Day Vulnerability
FBI Seizes BreachForums Again, Urges Users to Report Criminal Activity
Android 15 Rolls Out Advanced Features to Protect Users from Scams and Malicious Apps
Turla Group Deploys LunarWeb and LunarMail Backdoors in Diplomatic Missions